PRICES include / exclude VAT
Homepage>BS Standards>35 INFORMATION TECHNOLOGY. OFFICE MACHINES>35.030 IT Security>PD ISO/IEC TR 19791:2010 Information technology. Security techniques. Security assessment of operational systems
Sponsored link
immediate downloadReleased: 2010-04-30
PD ISO/IEC TR 19791:2010 Information technology. Security techniques. Security assessment of operational systems

PD ISO/IEC TR 19791:2010

Information technology. Security techniques. Security assessment of operational systems

Format
Availability
Price and currency
English Secure PDF
Immediate download
486.20 USD
English Hardcopy
In stock
486.20 USD
Standard number:PD ISO/IEC TR 19791:2010
Pages:246
Released:2010-04-30
ISBN:978 0 580 68087 8
Status:Standard
DESCRIPTION

PD ISO/IEC TR 19791:2010


This standard PD ISO/IEC TR 19791:2010 Information technology. Security techniques. Security assessment of operational systems is classified in these ICS categories:
  • 35.030 IT Security

This Technical Report provides guidance and criteria for the security evaluation of operational systems. It provides an extension to the scope of ISO/IEC 15408, by taking into account a number of critical aspects of operational systems not addressed in ISO/IEC 15408 evaluation. The principal extensions that are required address evaluation of the operational environment surrounding the target of evaluation, and the decomposition of complex operational systems into security domains that can be separately evaluated.

This Technical Report provides

  1. a definition and model for operational systems,

  2. a description of the extensions to ISO/IEC 15408 evaluation concepts needed to evaluate such operational systems,

  3. a methodology and process for performing the security evaluation of operational systems,

  4. additional security evaluation criteria to address those aspects of operational systems not covered by the ISO/IEC 15408 evaluation criteria.

This Technical Report permits the incorporation of security products evaluated against ISO/IEC 15408 into operational systems evaluated as a whole using this Technical Report.

This Technical Report is limited to the security evaluation of operational systems and does not consider other forms of system assessment. It does not define techniques for the identification, assessment and acceptance of operational risk.